Anonymize or destroy transactional logs for network activity when no longer needed.Configure any content filters to not collect or store browsing data.Ensure that any computer reservation management system records, print management records, or ILS records in regards to computer use are anonymized or destroyed when no longer needed.
Ensure that antivirus software that is installed has the ability to block spyware and keylogging software.
Use analog signage and/or splash screens to explain the library’s network and wifi access policies, including any privacy-related information.Priority 2 and Priority 3 actions may be more difficult for libraries to implement depending on their technical expertise, available resources, and organizational structure. Priority 1 are actions that hopefully all libraries can take to improve privacy practices. This checklist is intended to help libraries of all capacities take practical steps to implement the principles that are laid out in the Library Privacy Guidelines for Public Access Computers and Networks. Library Privacy Checklist 6: Public Access Computers and Networks